All of lore.kernel.org
 help / color / mirror / Atom feed
From: Chuck Lever <chuck.lever@oracle.com>
To: bfields@fieldses.org
Cc: linux-nfs@vger.kernel.org, linux-rdma@vger.kernel.org
Subject: [PATCH v4 18/33] SUNRPC: Replace dprintk call sites in TCP state change callouts
Date: Sat, 30 May 2020 09:29:38 -0400	[thread overview]
Message-ID: <20200530132938.10117.17749.stgit@klimt.1015granger.net> (raw)
In-Reply-To: <20200530131711.10117.74063.stgit@klimt.1015granger.net>

Report TCP socket state changes and accept failures via
tracepoints, replacing dprintk() call sites.

No tracepoint is added in svc_tcp_listen_data_ready. There's
no information available there that isn't also reported by the
svcsock_new_socket and the accept failure tracepoints.

Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
 include/trace/events/sunrpc.h |   67 +++++++++++++++++++++++++++++++++++++++++
 net/sunrpc/svcsock.c          |   35 ++++-----------------
 2 files changed, 73 insertions(+), 29 deletions(-)

diff --git a/include/trace/events/sunrpc.h b/include/trace/events/sunrpc.h
index fdc44675f347..8691fbeaff17 100644
--- a/include/trace/events/sunrpc.h
+++ b/include/trace/events/sunrpc.h
@@ -1500,6 +1500,73 @@ DEFINE_SVCSOCK_EVENT(tcp_send);
 DEFINE_SVCSOCK_EVENT(data_ready);
 DEFINE_SVCSOCK_EVENT(write_space);
 
+TRACE_EVENT(svcsock_tcp_state,
+	TP_PROTO(
+		const struct svc_xprt *xprt,
+		const struct socket *socket
+	),
+
+	TP_ARGS(xprt, socket),
+
+	TP_STRUCT__entry(
+		__field(unsigned long, socket_state)
+		__field(unsigned long, sock_state)
+		__field(unsigned long, flags)
+		__string(addr, xprt->xpt_remotebuf)
+	),
+
+	TP_fast_assign(
+		__entry->socket_state = socket->state;
+		__entry->sock_state = socket->sk->sk_state;
+		__entry->flags = xprt->xpt_flags;
+		__assign_str(addr, xprt->xpt_remotebuf);
+	),
+
+	TP_printk("addr=%s state=%s sk_state=%s flags=%s", __get_str(addr),
+		rpc_show_socket_state(__entry->socket_state),
+		rpc_show_sock_state(__entry->sock_state),
+		show_svc_xprt_flags(__entry->flags)
+	)
+);
+
+DECLARE_EVENT_CLASS(svcsock_accept_class,
+	TP_PROTO(
+		const struct svc_xprt *xprt,
+		const char *service,
+		long status
+	),
+
+	TP_ARGS(xprt, service, status),
+
+	TP_STRUCT__entry(
+		__field(long, status)
+		__string(service, service)
+		__array(unsigned char, addr, sizeof(struct sockaddr_in6))
+	),
+
+	TP_fast_assign(
+		__entry->status = status;
+		__assign_str(service, service);
+		memcpy(__entry->addr, &xprt->xpt_local, sizeof(__entry->addr));
+	),
+
+	TP_printk("listener=%pISpc service=%s status=%ld",
+		__entry->addr, __get_str(service), __entry->status
+	)
+);
+
+#define DEFINE_ACCEPT_EVENT(name) \
+	DEFINE_EVENT(svcsock_accept_class, svcsock_##name##_err, \
+			TP_PROTO( \
+				const struct svc_xprt *xprt, \
+				const char *service, \
+				long status \
+			), \
+			TP_ARGS(xprt, service, status))
+
+DEFINE_ACCEPT_EVENT(accept);
+DEFINE_ACCEPT_EVENT(getpeername);
+
 DECLARE_EVENT_CLASS(cache_event,
 	TP_PROTO(
 		const struct cache_detail *cd,
diff --git a/net/sunrpc/svcsock.c b/net/sunrpc/svcsock.c
index 758b835ad4ce..4ac1180c6306 100644
--- a/net/sunrpc/svcsock.c
+++ b/net/sunrpc/svcsock.c
@@ -657,9 +657,6 @@ static void svc_tcp_listen_data_ready(struct sock *sk)
 {
 	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
 
-	dprintk("svc: socket %p TCP (listen) state change %d\n",
-		sk, sk->sk_state);
-
 	if (svsk) {
 		/* Refer to svc_setup_socket() for details. */
 		rmb();
@@ -680,8 +677,7 @@ static void svc_tcp_listen_data_ready(struct sock *sk)
 		if (svsk) {
 			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
 			svc_xprt_enqueue(&svsk->sk_xprt);
-		} else
-			printk("svc: socket %p: no user data\n", sk);
+		}
 	}
 }
 
@@ -692,15 +688,11 @@ static void svc_tcp_state_change(struct sock *sk)
 {
 	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
 
-	dprintk("svc: socket %p TCP (connected) state change %d (svsk %p)\n",
-		sk, sk->sk_state, sk->sk_user_data);
-
-	if (!svsk)
-		printk("svc: socket %p: no user data\n", sk);
-	else {
+	if (svsk) {
 		/* Refer to svc_setup_socket() for details. */
 		rmb();
 		svsk->sk_ostate(sk);
+		trace_svcsock_tcp_state(&svsk->sk_xprt, svsk->sk_sock);
 		if (sk->sk_state != TCP_ESTABLISHED) {
 			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
 			svc_xprt_enqueue(&svsk->sk_xprt);
@@ -721,7 +713,6 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
 	struct socket	*newsock;
 	struct svc_sock	*newsvsk;
 	int		err, slen;
-	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
 
 	if (!sock)
 		return NULL;
@@ -735,30 +726,18 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
 		else if (err != -EAGAIN)
 			net_warn_ratelimited("%s: accept failed (err %d)!\n",
 					     serv->sv_name, -err);
+		trace_svcsock_accept_err(xprt, serv->sv_name, err);
 		return NULL;
 	}
 	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
 
 	err = kernel_getpeername(newsock, sin);
 	if (err < 0) {
-		net_warn_ratelimited("%s: peername failed (err %d)!\n",
-				     serv->sv_name, -err);
+		trace_svcsock_getpeername_err(xprt, serv->sv_name, err);
 		goto failed;		/* aborted connection or whatever */
 	}
 	slen = err;
 
-	/* Ideally, we would want to reject connections from unauthorized
-	 * hosts here, but when we get encryption, the IP of the host won't
-	 * tell us anything.  For now just warn about unpriv connections.
-	 */
-	if (!svc_port_is_privileged(sin)) {
-		dprintk("%s: connect from unprivileged port: %s\n",
-			serv->sv_name,
-			__svc_print_addr(sin, buf, sizeof(buf)));
-	}
-	dprintk("%s: connect from %s\n", serv->sv_name,
-		__svc_print_addr(sin, buf, sizeof(buf)));
-
 	/* Reset the inherited callbacks before calling svc_setup_socket */
 	newsock->sk->sk_state_change = svsk->sk_ostate;
 	newsock->sk->sk_data_ready = svsk->sk_odata;
@@ -776,10 +755,8 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
 	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
 	err = kernel_getsockname(newsock, sin);
 	slen = err;
-	if (unlikely(err < 0)) {
-		dprintk("svc_tcp_accept: kernel_getsockname error %d\n", -err);
+	if (unlikely(err < 0))
 		slen = offsetof(struct sockaddr, sa_data);
-	}
 	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
 
 	if (sock_is_loopback(newsock->sk))


  parent reply	other threads:[~2020-05-30 13:29 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-05-30 13:28 [PATCH v4 00/33] Possible NFSD patches for v5.8 Chuck Lever
2020-05-30 13:28 ` [PATCH v4 01/33] SUNRPC: Split the xdr_buf event class Chuck Lever
2020-05-30 13:28 ` [PATCH v4 02/33] SUNRPC: Move xpt_mutex into socket xpo_sendto methods Chuck Lever
2020-05-30 13:28 ` [PATCH v4 03/33] svcrdma: Clean up the tracing for rw_ctx_init errors Chuck Lever
2020-05-30 13:28 ` [PATCH v4 04/33] svcrdma: Clean up handling of get_rw_ctx errors Chuck Lever
2020-05-30 13:28 ` [PATCH v4 05/33] svcrdma: Trace page overruns when constructing RDMA Reads Chuck Lever
2020-05-30 13:28 ` [PATCH v4 06/33] svcrdma: trace undersized Write chunks Chuck Lever
2020-05-30 13:28 ` [PATCH v4 07/33] svcrdma: Fix backchannel return code Chuck Lever
2020-05-30 13:28 ` [PATCH v4 08/33] svcrdma: Remove backchannel dprintk call sites Chuck Lever
2020-05-30 13:28 ` [PATCH v4 09/33] svcrdma: Rename tracepoints that record header decoding errors Chuck Lever
2020-05-30 13:28 ` [PATCH v4 10/33] svcrdma: Remove the SVCRDMA_DEBUG macro Chuck Lever
2020-05-30 13:29 ` [PATCH v4 11/33] svcrdma: Displayed remote IP address should match stored address Chuck Lever
2020-05-30 13:29 ` [PATCH v4 12/33] svcrdma: Add tracepoints to report ->xpo_accept failures Chuck Lever
2020-05-30 13:29 ` [PATCH v4 13/33] SUNRPC: Remove kernel memory address from svc_xprt tracepoints Chuck Lever
2020-05-30 13:29 ` [PATCH v4 14/33] SUNRPC: Tracepoint to record errors in svc_xpo_create() Chuck Lever
2020-05-30 13:29 ` [PATCH v4 15/33] SUNRPC: Trace a few more generic svc_xprt events Chuck Lever
2020-05-30 13:29 ` [PATCH v4 16/33] SUNRPC: Remove "#include <trace/events/skb.h>" Chuck Lever
2020-05-30 13:29 ` [PATCH v4 17/33] SUNRPC: Add more svcsock tracepoints Chuck Lever
2020-05-30 13:29 ` Chuck Lever [this message]
2020-05-30 13:29 ` [PATCH v4 19/33] SUNRPC: Trace server-side rpcbind registration events Chuck Lever
2020-05-30 13:29 ` [PATCH v4 20/33] SUNRPC: Rename svc_sock::sk_reclen Chuck Lever
2020-05-30 13:29 ` [PATCH v4 21/33] SUNRPC: Restructure svc_tcp_recv_record() Chuck Lever
2020-05-30 13:30 ` [PATCH v4 22/33] SUNRPC: Replace dprintk() call sites in TCP receive path Chuck Lever
2020-05-30 13:30 ` [PATCH v4 23/33] SUNRPC: Refactor recvfrom path dealing with incomplete TCP receives Chuck Lever
2020-05-30 13:30 ` [PATCH v4 24/33] SUNRPC: Clean up svc_release_skb() functions Chuck Lever
2020-05-30 13:30 ` [PATCH v4 25/33] SUNRPC: Refactor svc_recvfrom() Chuck Lever
2020-05-30 13:30 ` [PATCH v4 26/33] SUNRPC: Restructure svc_udp_recvfrom() Chuck Lever
2020-05-30 13:30 ` [PATCH v4 27/33] SUNRPC: svc_show_status() macro should have enum definitions Chuck Lever
2020-05-30 13:30 ` [PATCH v4 28/33] NFSD: Add tracepoints to NFSD's duplicate reply cache Chuck Lever
2020-05-30 13:30 ` [PATCH v4 29/33] NFSD: Add tracepoints to the NFSD state management code Chuck Lever
2020-05-30 13:30 ` [PATCH v4 30/33] NFSD: Add tracepoints for monitoring NFSD callbacks Chuck Lever
2020-05-30 13:30 ` [PATCH v4 31/33] SUNRPC: Clean up request deferral tracepoints Chuck Lever
2020-05-30 13:30 ` [PATCH v4 32/33] NFSD: Squash an annoying compiler warning Chuck Lever
2020-05-30 13:30 ` [PATCH v4 33/33] NFSD: Fix improperly-formatted Doxygen comments Chuck Lever
2020-06-01 14:38 ` [PATCH v4 00/33] Possible NFSD patches for v5.8 J. Bruce Fields

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200530132938.10117.17749.stgit@klimt.1015granger.net \
    --to=chuck.lever@oracle.com \
    --cc=bfields@fieldses.org \
    --cc=linux-nfs@vger.kernel.org \
    --cc=linux-rdma@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.